Interview with a Mentee…Mentee X – infosecmentors.blogspot.com
I tried to choose individuals that have been paired up for at least two months and I also chose to keep the participants anonymous as I thought I’d receive more honest answers, both praise and critique of the program.

rpc-client – code.google.com/p/rpc-client/
The tool is designed to make, in command line, easily XML-RPC packet to a remote server and offering the possibility of being used in scripts for automation.

TrueCrypt 7.0a released – h-online.com
According to the developers, TrueCrypt 7.0a is a maintenance release that includes a workaround for an issue in some custom, non-Microsoft storage device controller drivers.

cvechecker 0.6 – cvechecker.sourceforge.net
Indeed, this is not a bullet-proof method and you will most likely have many false positives, yet it is still better than nothing, especially if you are running a distribution with little security coverage.

Ncrack 0.3ALPHA release – seclists.org
The post-SoC Ncrack 0.3ALPHA release is finally ready! This summer brings you new cracking modules for two of the most ubiquitous and famous protocols out there

HexInject – hexinject.sourceforge.net
HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.

WinAPIOverride32 – jacquelin.potier.free.fr/winapioverride32
It tries to fill the gap between classical API monitoring softwares and debuggers.

Techniques:

Everybody Loves REMnux – holisticinfosec.blogspot.com
A quick read of the SANS Forensics blog, courtesy of Gregory Pendergast, and you’ll get a feel for all the positive feedback for Lenny Zeltser’s REMnux.

Integrity Levels and DLL Injection – didierstevens.com
For processes, this means that a process with low integrity level can’t open a handle with full access to a process with medium integrity level.

Apple’s secret “wispr” request – erratasec.blogspot.com
There is more complexity to this feature than the simple HTTP request; there is probably a way to attack it.

PDF XSS (CVE-2010-0190) – xs-sniper.com
PDFs support JavaScript from within the PDF. Unfortunately, the script executed from within the PDF will not have access to the browsers DOM.

Rapid Fire PSEXEC for Metasploit – room362.com
Exploit modules inside of metasploit don’t have the ability to run on multiple hosts with one swing of the bat. So I created some code to facilitate that

Vulnerabilities:

New Adobe Acrobat/Reader flaw emerges
In an advisory published Wednesday, Adobe said a critical vulnerability exists in Acrobat and Reader versions 9.3.4 and earlier, and that there are reports that this critical vulnerability is being actively exploited in the wild.

As expected, MS offers new fix for DLL security hole
With the broad range of software impacted this vulnerability has the potential to wreak havoc within the enterprise and admins are encouraged to implement the workaround using the new Microsoft tool to afford the necessary risk mitigation.

NSA Director Says U.S. Has a Duty to Secure the Internet – threatpost.com
The United States has a responsibility to take a leadership role in securing the Internet against both internal and external attackers, a duty that the federal government takes very seriously, the country’s top military cybersecurity official said Tuesday.

Behind the scenes and inside workings of a CERT – net-security.org
This particular CERT differs from what you can find in most other countries, since it’s not government-backed and relies mainly on the good will of several security professionals.

Guess What, You Don’t Own That Software You Bought – wired.com
A federal appeals court said Friday that software makers can use shrink-wrap and click-wrap licenses to forbid the transfer or resale of their wares, an apparent gutting of the so-called first-sale doctrine.

Rogue employees sell passport data of World Cup fans – net-security.org
This serious breach of trust could have been avoided if FIFA had monitored – and secured – the access to football fans personal data by their staff, as well as the association’s files and databases.

About Us

Infosec Events is dedicated to the growing information security industry. We strive to provide useful information and resources to those in the industry. Don't hesitate to contact us should you need anything.